Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Effective Data Security in Virtualization using Maize Routing Technique

1S. Anthoniraj and 2S. Saraswathi
1Department of Computer Science and Engineering, Manonmaniam Sundarnar University, Thirunelveli 627 012, India
2Department of Information Technology, Pondicherry Engineering College, Puducherry 605 014, India
Research Journal of Applied Sciences, Engineering and Technology  2014  6:755-759
http://dx.doi.org/10.19026/rjaset.8.1031  |  © The Author(s) 2014
Received: May ‎19, ‎2014  |  Accepted: July ‎01, ‎2014  |  Published: August 15, 2014

Abstract

Virtualization is a technology that combines or divides computing resources to present one or many operating environments using methodologies like hardware and software partitioning or aggregation, partial or complete machine simulation, emulation, time-sharing and others. The hackers are also making use of it for hiding their identity and to exploit the other machines. One more terminology, as port scanner for scanning the presence of hackers. It is also distorted by them in such a way for the analysis of open ports and also it provides a solution with the roll backing system and the Maize routing. So whenever the information loss occurs, the roll back mechanism is introduced and used as a secondary security. As a primary, the proposed concept of Maize Routing (MR) is used. Here we uses the Base Internet Protocol (IP) of the virtualized system as a reference and produce multiple duplicated IP’s. Whenever the presence of the hacker is found, then the revealing mechanism sends a link to the virtual machine and directed to the Maize routing. Then the execution mechanism activates and diverts them in to a wrong direction. Hence the effective data security is achieved by using the mechanism of maize routing.

Keywords:

Execution mechanism , hypervisor , internet protocol , Maize Routing (MR) , Para-Virtualization (PV), private cloud , rollback system , virtualizations , Virtual Machine Monitor (VMM) , XEN,


References

  1. Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield, 2003. Xen and the art of virtualization. Proceedings of the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, NY, pp: 164-177.
    CrossRef    
  2. Boucher, P., A. Shostack and I. Goldberg, 2000. Freedom Systems 2.0 Architecture. White Paper, Zero Knowledge Systems Inc., Montreal, Canada, December 2000.
  3. Chaum, D., 1985. Security without identification: Transaction systems to make big brother obsolete. Commun. ACM, 28(10): 1030-1044.
    CrossRef    
  4. Goldschlag, D., M. Reed and P. Syverson, 1996. Hiding Routing Information. In: Anderson, R. (Ed.), Information Hiding. LNCS 1174, Springer, Heidelberg, pp: 137-150.
    CrossRef    
  5. Oppenheimer, D., A. Ganapathi and D.A. Patterson, 2003. Why do Internet services fail and what can be done about it. Proceeding of the 4th Conference on USENIX Symposium on Internet Technologies and Systems (USITS, 2003), 4: 1-1.
  6. Patterson, D., 2002. Recovery Oriented Computing (ROC): Motivation, definition, techniques and case studies. Computer Science Technical Report UCB//CSD-02-1175, U.C. Berkeley.
  7. Rosenblum, M. and T. Garfinkel, 2005. Virtual machine monitors: Current technology and future trends. Computer, 38(5): 39-47.
    CrossRef    
  8. Syverson, P., G. Tsudik, M. Reed and C. Landwehr, 2001. Towards an Analysis of Onion Routing Security. In: Federrath, H. (Ed.), Designing Privacy Enhancing Technologies. LNCS, Springer, Heidelberg, 2009: 96-114.
  9. Uhlig, R., G. Neiger, D. Rodgers, A.L. Santoni, F.C.M. Martins, A.V. Anderson, S.M. Bennett, A. Kagi, F.H. Leung and L. Smith, 2005. Intel Virtualization Technology. Computer, 38(5): 48-56.
    CrossRef    
  10. Whitaker, A., M. Shaw and S.D. Gribble, 2002. Denali: Lightweight virtual machines for distributed and networked applications. Technical Report 02-02-01, University of Washington, Seattle.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved